[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252588

 
 

909

 
 

196930

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26675 Download | Alert*

The host is installed with Foxit PDF Reader through 12.1.3.15356 or Foxit PDF Editor through 10.1.12.37872, 11.x through 11.2.7.53812, 12.x through 12.1.3.15356 or 2023.1.0.15510 and is prone to an use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation could allow attackers to execute remote code or disclose i ...

The host is installed with Cacti 1.2.25 and is prone to an SQL injection vulnerability. A flaw is present in the application, which fails to properly handle the form_actions() function in the managers.php function. Successful exploitation allows a remote attacker to obtain sensitive information.

Improper initialization in the Intel(R) TXT SINIT ACM for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Out-of-bounds read in firmware for the Intel(R) Integrated Sensor Solution before versions 5.4.2.4579v3, 5.4.1.4479 and 5.0.0.4143 may allow a privileged user to potentially enable denial of service via local access.

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.


Pages:      Start    1298    1299    1300    1301    1302    1303    1304    1305    1306    1307    1308    1309    1310    1311    ..   2667

© SecPod Technologies